2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)

12-14 Dec. 2015

Filter Results

Displaying Results 1 - 25 of 117
  • [Front cover]

    Publication Year: 2015, Page(s): 1
    Request permission for reuse | PDF file iconPDF (18 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2015, Page(s): 1
    Request permission for reuse | PDF file iconPDF (36 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2015, Page(s):i - vii
    Request permission for reuse | PDF file iconPDF (279 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2015, Page(s):1 - 7
    Request permission for reuse | PDF file iconPDF (44 KB)
    Freely Available from IEEE
  • Conference committees

    Publication Year: 2015, Page(s):1 - 4
    Request permission for reuse | PDF file iconPDF (156 KB)
    Freely Available from IEEE
  • Honorary chairs

    Publication Year: 2015, Page(s):1 - 3
    Request permission for reuse | PDF file iconPDF (313 KB)
    Freely Available from IEEE
  • Keynote speakers

    Publication Year: 2015, Page(s): 1
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (12 KB)

    Provides an abstract for each of the keynote presentations and may include a brief professional biography of each View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Simulated humanoid robots for e-learning

    Publication Year: 2015, Page(s): 1
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (107 KB) | HTML iconHTML

    Robots will change our life dramatically. People are interested to know more about Robotics and AI. Teaching has to regard these developments. While learning by doing has great advantages, experimenting with real robots is limited by the available resources: Complex hardware is costly, and it needs time and experience for setup and maintenance. Simulated robots can be used as alternative. Our Robo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mining educational data: A focus on learning analytics

    Publication Year: 2015, Page(s): 1
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (120 KB) | HTML iconHTML

    Data mining is a process of finding anomalies, implicit patterns, and correlations within large data sets to predict outcomes, or in other words, the search for relationships and global patterns that exist, but are `hidden' among the vast amounts of data. When applied to the educational domain, data mining is a powerful tool that enables better understanding of relationships, structure, patterns, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Smart Grid: Potentials and motivation

    Publication Year: 2015, Page(s): 1
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (149 KB) | HTML iconHTML

    As electricity generation from different sources with intermittent power generation increases, and as the customer becomes more active in relation to their energy use, there is a growing need for intelligent, flexible and more reliable distribution networks. This has led to the development of smart grids, which provide the required system, market and tools to meet demands. Smart grid technologies ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IT and predictive diagnosis

    Publication Year: 2015, Page(s): 1
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (95 KB) | HTML iconHTML

    Summary form only given. Information diminishes the uncertainty of a receiver to react in a certain optimum manner. It is a statistical property, or an event in a statistical population, and can be calculated by different entropy algorithms.. In image analysis one should distinguish between image content information (ICI), which is information that can be evaluated from the image itself and extern... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cyber - Physical Systems: Reality, dreams, and fantasy

    Publication Year: 2015, Page(s):1 - 2
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (150 KB) | HTML iconHTML

    Summary form only given. The integration of physical systems with networked sensing, computation networks, and embedded control with actuation has led to the emergence of a new generation of engineered systems, the Cyber-Physical Systems (CPS). Such systems emphasize the link between cyber space and physical environment (i.e., time, space, and energy). CPS represents the next generation of complex... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intensionality, compositionality, and nominativity in information system development

    Publication Year: 2015, Page(s):1 - 2
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (138 KB) | HTML iconHTML

    Summary form only given. Process of information system development consists of several phases including, in particular, system analysis, specification, design, and implementation. Each of these phases is based on some abstractions that can be roughly divided into two groups of general and specific abstractions respectively. In this talk we address to such general abstractions as intensionality, co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Quantum information technology: Theory and applications

    Publication Year: 2015, Page(s):1 - 2
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (117 KB) | HTML iconHTML

    In the last decade quantum information theory and technology evolve and show their great potential. There are a set of problems for which it's more efficient and even not possible with classical communication to solve than with quantum equivalent. The best known example is Quantum Key Distribution, though there are quantum non-locality (entanglement), quantum teleportation, communication complexit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Metaheuristics for the design of safety critical systems: A synthesis of logic and biology in system design

    Publication Year: 2015, Page(s):1 - 2
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (119 KB) | HTML iconHTML

    The technologies of model-based design and dependability analysis in the design of safety critical systems, including software intensive systems, have advanced in recent years. Much of this development can be attributed to the application of advances in formal logic and its application to verification of systems. In parallel, bio-inspired technologies have shown potential for the evolutionary desi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cyber fuzzy assessment methods

    Publication Year: 2015, Page(s):1 - 2
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (104 KB) | HTML iconHTML

    The assessment of a system's performance is a very important task for its operation, because the results obtained by this action help the designer/user of the system to correct its weaknesses, thus making it more effective. The assessment methods usually utilized in practice are based on the principles of classical, bivalent logic (yes-no). However, in our everyday life they frequently appear asse... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Symposium and workshops

    Publication Year: 2015, Page(s): 1
    Request permission for reuse | PDF file iconPDF (13 KB)
    Freely Available from IEEE
  • Large-scale ontology storage and query using graph database-oriented approach: The case of Freebase

    Publication Year: 2015, Page(s):39 - 43
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (374 KB) | HTML iconHTML

    Ontology has been increasingly recognised as an instrumental artifact to help make sense of large amounts of data. However, the challenges of Big Data significantly overburden the process of ontology storage and query particularly. In this respect, the paper aims to convey considerations in relation to improving the practice of storing or querying large-scale ontologies. Initially, a systematic li... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A proposed security service set for VANET SOA

    Publication Year: 2015, Page(s):649 - 653
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (507 KB) | HTML iconHTML

    In Vehicular Ad Hoc Networks (VANETs), nodes are represented by Vehicles. Communication in VANETs can take place either between vehicles Vehicle-to-Vehicle (V2V), or between Vehicle and Infrastructure (V2I). Securing exchanged messages between Vehicles is of great importance, especially when they are life critical messages. Some of the Previous security researches discussed how to enable secure co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of the relationship between Saudi twitter posts and the Saudi stock market

    Publication Year: 2015, Page(s):660 - 665
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1712 KB) | HTML iconHTML

    Sentiment analysis has become the heart of social media research and many studies have been applied to obtain users' opinion in fields such as electronic commerce and trade, management and also regarding political figures. Social media has recently become a rich resource in mining user sentiments. Social opinion has been analysed using sentiment analysis and some studies show that sentiment analys... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modelling of lateral flow in a Hot Strip Mill (HSM) using adaptive techniques

    Publication Year: 2015, Page(s):44 - 49
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (876 KB) | HTML iconHTML

    During the last years, data mining models have proven to be a promising approach to improve hot rolling processes. In the present research we propose a model for prediction of lateral flow. In hot rolling mills this will lead to exact predictions of the strip width after rolling, which reduces cut-offs and scrapped material. Any reduction of the cut-offs implies important economical and environmen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The semantic analysis method and algorithms of open tests answers on “cyber-2” pattern in the knowledge revival and evaluation systems

    Publication Year: 2015, Page(s):50 - 55
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (285 KB) | HTML iconHTML

    Is given the identification and assessment of knowledge in the computer systems in scientific terms it is one of the interesting and in practical terms, the topical - The open type tests processing value. In the open-type tests the semantic analysis method and algorithms are written in natural language. Are introduces a semantic analyzer results. Semantic Analyzer represents by the author, designe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computational complexity for some problems of two terms unification based on concatenation

    Publication Year: 2015, Page(s):56 - 57
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (98 KB) | HTML iconHTML

    Tools for description of bounds for word variable values are offered. The use of these descriptions provides the conditions of a problem belonging to the class P or to the class NP. NP-completeness of an unification problem is proved. The validity of the proved bounds may make possible to create effective algorithms for unification of word terms, used in such programming language as Refal. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards a semantic information system for IT services

    Publication Year: 2015, Page(s):58 - 65
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1197 KB) | HTML iconHTML

    The challenges in IT management are growing in all kinds of organizations. Even small and medium ones are faced with an accelerating variety and disparity of IT services as serious resources, infrastructural elements, as well as outputs of essential business processes. A proved approach to cope with such challenges is a sustainable service orientation; and one reasonable starting point may be an I... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An intelligent optimization approach for storage space allocation at seaports: A case study

    Publication Year: 2015, Page(s):66 - 72
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (2272 KB) | HTML iconHTML

    Storage space allocation problem at container terminals is NP-hard combinatorial optimization problem. This paper proposes a new approach based on genetic algorithm to optimize the solution for storage space allocation problem in container terminal at seaports. A new mathematical model is formulated to avoid bottlenecks in container yard operations, and to minimize vessels service time in port. Al... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.